Category: GBHackers

Google Drive Desktop for Windows Flaw Lets Users Gain Full Access to Others’ Drives
10
Sep
2025

Google Drive Desktop for Windows Flaw Lets Users Gain Full Access to Others’ Drives

Millions of people and businesses trust Google Drive every day to store important files like contracts, reports, photos, and research…

Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Enables Admin Takeover
10
Sep
2025

Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Enables Admin Takeover

The Amp’ed RF BT-AP 111 Bluetooth Access Point has been discovered to expose its HTTP-based administrative interface entirely without authentication…

Accessible AI-Powered Cybersecurity Platform for SME Security
10
Sep
2025

Accessible AI-Powered Cybersecurity Platform for SME Security

Sofia, Bulgaria, September 10th, 2025, CyberNewsWire Kikimora, a cybersecurity specialist and a product developer, has announced the launch of Kikimora…

Meta Verified Scam Ads on Facebook Steal User Account Details
10
Sep
2025

Meta Verified Scam Ads on Facebook Steal User Account Details

Content creators and small businesses are facing a sophisticated new threat targeting their Facebook accounts through deceptive advertisements promising free…

AsyncRAT Leverages Fileless Techniques to Bypass Detection
10
Sep
2025

AsyncRAT Leverages Fileless Techniques to Bypass Detection

Fileless malware has become a formidable adversary for security teams, operating entirely in memory and evading disk-based detection. A recent…

Multiple Vulnerabilities in GitLab Patched, Blocking DoS and SSRF Attack Vectors
10
Sep
2025

Multiple Vulnerabilities in GitLab Patched, Blocking DoS and SSRF Attack Vectors

GitLab has released critical security updates across multiple versions to address six significant vulnerabilities that could enable denial-of-service attacks, server-side…

CyberVolk Ransomware Targets Windows Systems in Critical Infrastructure and Research Institutions
10
Sep
2025

CyberVolk Ransomware Targets Windows Systems in Critical Infrastructure and Research Institutions

CyberVolk ransomware, which first emerged in May 2024, has escalated its operations against government agencies, critical infrastructure, and scientific institutions…

10
Sep
2025

Meta Verified Scam Ads on Facebook Steal User Account Details

Content creators and small businesses are facing a sophisticated new threat targeting their Facebook accounts through deceptive advertisements promising free…

Apple CarPlay Vulnerability Allows Remote Code Execution to Gain Root Access
10
Sep
2025

Apple CarPlay Vulnerability Allows Remote Code Execution to Gain Root Access

A newly disclosed vulnerability in Apple’s CarPlay ecosystem enables remote code execution with root privileges, posing a serious risk to connected…

Hackers Impersonate Google AppSheet in Latest Phishing Campaign
10
Sep
2025

Hackers Impersonate Google AppSheet in Latest Phishing Campaign

The cybersecurity landscape has witnessed a novel phishing campaign that weaponizes Google’s no-code platform, AppSheet, to harvest user credentials. By…

Threat Actor’s Self-Deployment of EDR Exposes Their Tools and Workflows
10
Sep
2025

Threat Actor’s Self-Deployment of EDR Exposes Their Tools and Workflows

In a twist of fate that underscores both the power and inherent transparency of endpoint detection and response (EDR) solutions….

GONEPOSTAL Malware Exploits Outlook for Stealthy Command-and-Control
10
Sep
2025

GONEPOSTAL Malware Exploits Outlook for Stealthy Command-and-Control

A sophisticated espionage campaign leveraging a previously unknown malware strain dubbed GONEPOSTAL, attributed to the notorious Russian state-sponsored group KTA007,…